Blog

Author:

Feature Image

By Susan Marrow

What is SAML vs. OAuth

SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are both open standards that are used within identity management to handle authentication and authorization.

Read more February 22, 2024 7 min read
Feature Image

By Susan Marrow

Shadow IT: The Dangers and How to Avoid them

Back in the day, before the network perimeter had eroded, controlling the use of applications and devices by a business’s employees was fairly straightforward.

Read more February 15, 2024 7 min read
Feature Image

By Susan Marrow

What Is IGA (Identity Governance and Administration)

Enterprise digital environments have never been more convoluted. People and devices that need to access and share digital resources are threaded throughout our corporate networks.

Read more February 6, 2024 6 min read
Feature Image

By Susan Marrow

What Is IAM (Identity and Access Management)?

Employees, customers, supply chain members, and contractors must have access to digital resources for work. Identity and access management (IAM) or IAM services manage and control the who, what, and when of resource access.

Read more January 25, 2024 6 min read
Feature Image

By Susan Marrow

What is Authentication vs. Authorization

Authentication and authorization are core pillars of IAM (identity and access management). These two terms are often used interchangeably; however, they have different but complementary roles.

Read more January 16, 2024 6 min read
Feature Image

By Susan Marrow

What Is MFA (Multifactor Authentication)

The password has been a staple of access control for decades. However, we can no longer rely on this form of single-factor authentication for robust cybersecurity.

Read more September 10, 2023 6 min read